CINXE.COM
Search results for: vault
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: vault</title> <meta name="description" content="Search results for: vault"> <meta name="keywords" content="vault"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="vault" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="vault"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 14</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: vault</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> Modelling Medieval Vaults: Digital Simulation of the North Transept Vault of St Mary, Nantwich, England</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Webb">N. Webb</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Buchanan"> A. Buchanan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital and virtual heritage is often associated with the recreation of lost artefacts and architecture; however, we can also investigate works that were not completed, using digital tools and techniques. Here we explore physical evidence of a fourteenth-century Gothic vault located in the north transept of St Mary’s church in Nantwich, Cheshire, using existing springer stones that are built into the walls as a starting point. Digital surveying tools are used to document the architecture, followed by an analysis process to hypothesise and simulate possible design solutions, had the vault been completed. A number of options, both two-dimensionally and three-dimensionally, are discussed based on comparison with examples of other contemporary vaults, thus adding another specimen to the corpus of vault designs. Dissemination methods such as digital models and 3D prints are also explored as possible resources for demonstrating what the finished vault might have looked like for heritage interpretation and other purposes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20simulation" title="digital simulation">digital simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=heritage%20interpretation" title=" heritage interpretation"> heritage interpretation</a>, <a href="https://publications.waset.org/abstracts/search?q=medieval%20vaults" title=" medieval vaults"> medieval vaults</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20heritage" title=" virtual heritage"> virtual heritage</a>, <a href="https://publications.waset.org/abstracts/search?q=3d%20scanning" title=" 3d scanning"> 3d scanning</a> </p> <a href="https://publications.waset.org/abstracts/55632/modelling-medieval-vaults-digital-simulation-of-the-north-transept-vault-of-st-mary-nantwich-england" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Young’s Modulus Variability: Influence on Masonry Vault Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelmounaim%20Zanaz">Abdelmounaim Zanaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Sylvie%20Yotte"> Sylvie Yotte</a>, <a href="https://publications.waset.org/abstracts/search?q=Fazia%20Fouchal"> Fazia Fouchal</a>, <a href="https://publications.waset.org/abstracts/search?q=Alaa%20Chateauneuf"> Alaa Chateauneuf</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a methodology for probabilistic assessment of bearing capacity and prediction of failure mechanism of masonry vaults at the ultimate state with consideration of the natural variability of Young’s modulus of stones. First, the computation model is explained. The failure mode is the most reported mode, i.e. the four-hinge mechanism. Based on this assumption, the study of a vault composed of 16 segments is presented. The Young’s modulus of the segments is considered as random variable defined by a mean value and a coefficient of variation CV. A relationship linking the vault bearing capacity to the modulus variation of voussoirs is proposed. The failure mechanisms, in addition to that observed in the deterministic case, are identified for each CV value as well as their probability of occurrence. The results show that the mechanism observed in the deterministic case has decreasing probability of occurrence in terms of CV, while the number of other mechanisms and their probability of occurrence increase with the coefficient of variation of Young’s modulus. This means that if a significant change in the Young modulus of the segments is proven, taken it into account in computations becomes mandatory, both for determining the vault bearing capacity and for predicting its failure mechanism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=masonry" title="masonry">masonry</a>, <a href="https://publications.waset.org/abstracts/search?q=mechanism" title=" mechanism"> mechanism</a>, <a href="https://publications.waset.org/abstracts/search?q=probability" title=" probability"> probability</a>, <a href="https://publications.waset.org/abstracts/search?q=variability" title=" variability"> variability</a>, <a href="https://publications.waset.org/abstracts/search?q=vault" title=" vault"> vault</a> </p> <a href="https://publications.waset.org/abstracts/31230/youngs-modulus-variability-influence-on-masonry-vault-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">442</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> Historical Development of Bagh-e Dasht in Herat, Afghanistan: A Comprehensive Field Survey of Physical and Social Aspects </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khojesta%20Kawish">Khojesta Kawish</a>, <a href="https://publications.waset.org/abstracts/search?q=Tetsuya%20Ando"> Tetsuya Ando</a>, <a href="https://publications.waset.org/abstracts/search?q=Sayed%20Abdul%20Basir%20Samimi"> Sayed Abdul Basir Samimi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bagh-e Dasht area is situated in the northern part of Herat, an old city in western Afghanistan located on the Silk Road which has received a strong influence from Persian culture. Initially, the Bagh-e Dasht area was developed for gardens and palaces near Joy-e Injil canal during the Timurid Empire in the 15<sup>th</sup> century. It is assumed Bagh-e Dasht became a settlement in the 16<sup>th</sup> century during the Safavid Empire. The oldest area is the southern part around the canal bank which is characterized by Dalans, sun-dried brick arcades above which houses are often constructed. Traditional houses in this area are built with domical vault roofs constructed with sun-dried bricks. Bagh-e Dasht is one of the best-preserved settlements of traditional houses in Herat. This study examines the transformation of the Bagh-e Dasht area with a focus on Dalans, where traditional houses with domical vault roofs have been well-preserved until today. The aim of the study is to examine the extent of physical changes to the area as well as changes to houses and the community. This research paper contains original results which have previously not been published in architectural history. The roof types of houses in the area are investigated through examining high resolution satellite images. The boundary of each building and space is determined by both a field survey and aerial photographs of the study area. A comprehensive field survey was then conducted to examine each space and building in the area. In addition, a questionnaire was distributed to the residents of the Dalan houses and interviews were conducted with the Wakil (Chief) of the area, a local historian, residents and traditional builders. The study finds that the oldest part of Bagh-e Dasht area, the south, contains both Dalans and domical vault roof houses. The next oldest part, which is the north, only has domical vault roof houses. The rest of the area only has houses with modernized flat roofs. This observation provides an insight into the process of historical development in the Bagh-e Dasht area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Afghanistan" title="Afghanistan">Afghanistan</a>, <a href="https://publications.waset.org/abstracts/search?q=Bagh-e%20Dasht" title=" Bagh-e Dasht"> Bagh-e Dasht</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalan" title=" Dalan"> Dalan</a>, <a href="https://publications.waset.org/abstracts/search?q=domical%20vault" title=" domical vault"> domical vault</a>, <a href="https://publications.waset.org/abstracts/search?q=Herat" title=" Herat"> Herat</a>, <a href="https://publications.waset.org/abstracts/search?q=over%20path%20house" title=" over path house"> over path house</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20house" title=" traditional house"> traditional house</a> </p> <a href="https://publications.waset.org/abstracts/96853/historical-development-of-bagh-e-dasht-in-herat-afghanistan-a-comprehensive-field-survey-of-physical-and-social-aspects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96853.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">133</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Potential of Dredged Material for CSEB in Building Structure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=BoSheng%20Liu">BoSheng Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research goal is to re-image a locally-sourced waste product as abuilding material. The author aims to contribute to the compressed stabilized earth block (CSEB) by investigating the promising role of dredged material as an alternative building ingredient in the production of bricks and tiles. Dredged material comes from the sediment deposited near the shore or downstream, where the water current velocity decreases. This sediment needs to be dredged to provide water transportation; thus, there are mounds of the dredged material stored at bay. It is the interest of this research to reduce the filtered un-organic soil in the production of CSEB and replace it with locally dredged material from the Atchafalaya River in Morgan City, Louisiana. Technology and mechanical innovations have evolved the traditional adobe production method, which mixes the soil and natural fiber into molded bricks, into chemically stabilized CSEB made by compressing the clay mixture and stabilizer in a compression chamber with particular loads. In the case of dredged material CSEB (DM-CSEB), cement plays an essential role as the bending agent contributing to the unit strength while sustaining the filtered un-organic soil. Each DM-CSEB unit is made in a compression chamber with 580 PSI (i.e., 4 MPa) force. The research studied the cement content from 5% to 10% along with the range of dredged material mixtures, which differed from 20% to 80%. The material mixture content affected the DM-CSEB's strength and workability during and after its compression. Results indicated two optimal workabilities of the mixture: 27% fine clay content and 63% dredged material with 10% cement, or 28% fine clay content, and 67% dredged material with 5% cement. The final product of DM-CSEB emitted between 10 to 13 times fewer carbon emissions compared to the conventional fired masonry structure. DM-CSEB satisfied the strength requirement given by the ASTM C62 and ASTM C34 standards for construction material. One of the final evaluations tested and validated the material performance by designing and constructing an architectural, conical tile-vault prototype that was 28" by 40" by 24." The vault utilized a computational form-finding approach to generate the form's geometry, which optimized the correlation between the vault geometry and structural load distribution. A series of scaffolding was deployed to create the framework for the tile-vault construction. The final tile-vault structure was made from 2 layers of DM-CSEB tiles jointed by mortar, and the construction of the structure used over 110 tiles. The tile-vault prototype was capable of carrying over 400 lbs of live loads, which further demonstrated the dredged material feasibility as a construction material. The presented case study of Dredged Material Compressed Stabilized Earth Block (DM-CSEB) provides the first impression of dredged material in the clayey mixture process, structural performance, and construction practice. Overall, the approach of integrating dredged material in building material can be feasible, regionally sourced, cost-effective, and environment-friendly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dredged%20material" title="dredged material">dredged material</a>, <a href="https://publications.waset.org/abstracts/search?q=compressed%20stabilized%20earth%20block" title=" compressed stabilized earth block"> compressed stabilized earth block</a>, <a href="https://publications.waset.org/abstracts/search?q=tile-vault" title=" tile-vault"> tile-vault</a>, <a href="https://publications.waset.org/abstracts/search?q=regionally%20sourced" title=" regionally sourced"> regionally sourced</a>, <a href="https://publications.waset.org/abstracts/search?q=environment-friendly" title=" environment-friendly"> environment-friendly</a> </p> <a href="https://publications.waset.org/abstracts/114848/potential-of-dredged-material-for-cseb-in-building-structure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114848.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">115</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> Generative AI: A Comparison of Conditional Tabular Generative Adversarial Networks and Conditional Tabular Generative Adversarial Networks with Gaussian Copula in Generating Synthetic Data with Synthetic Data Vault</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lakshmi%20Prayaga">Lakshmi Prayaga</a>, <a href="https://publications.waset.org/abstracts/search?q=Chandra%20Prayaga.%20Aaron%20Wade"> Chandra Prayaga. Aaron Wade</a>, <a href="https://publications.waset.org/abstracts/search?q=Gopi%20Shankar%20Mallu"> Gopi Shankar Mallu</a>, <a href="https://publications.waset.org/abstracts/search?q=Harsha%20Satya%20Pola"> Harsha Satya Pola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Synthetic data generated by Generative Adversarial Networks and Autoencoders is becoming more common to combat the problem of insufficient data for research purposes. However, generating synthetic data is a tedious task requiring extensive mathematical and programming background. Open-source platforms such as the Synthetic Data Vault (SDV) and Mostly AI have offered a platform that is user-friendly and accessible to non-technical professionals to generate synthetic data to augment existing data for further analysis. The SDV also provides for additions to the generic GAN, such as the Gaussian copula. We present the results from two synthetic data sets (CTGAN data and CTGAN with Gaussian Copula) generated by the SDV and report the findings. The results indicate that the ROC and AUC curves for the data generated by adding the layer of Gaussian copula are much higher than the data generated by the CTGAN. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=synthetic%20data%20generation" title="synthetic data generation">synthetic data generation</a>, <a href="https://publications.waset.org/abstracts/search?q=generative%20adversarial%20networks" title=" generative adversarial networks"> generative adversarial networks</a>, <a href="https://publications.waset.org/abstracts/search?q=conditional%20tabular%20GAN" title=" conditional tabular GAN"> conditional tabular GAN</a>, <a href="https://publications.waset.org/abstracts/search?q=Gaussian%20copula" title=" Gaussian copula"> Gaussian copula</a> </p> <a href="https://publications.waset.org/abstracts/183000/generative-ai-a-comparison-of-conditional-tabular-generative-adversarial-networks-and-conditional-tabular-generative-adversarial-networks-with-gaussian-copula-in-generating-synthetic-data-with-synthetic-data-vault" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183000.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Occipital Squama Convexity and Neurocranial Covariation in Extant Homo sapiens</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Miranda%20E.%20Karban">Miranda E. Karban</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A distinctive pattern of occipital squama convexity, known as the occipital bun or chignon, has traditionally been considered a derived Neandertal trait. However, some early modern and extant Homo sapiens share similar occipital bone morphology, showing pronounced internal and external occipital squama curvature and paralambdoidal flattening. It has been posited that these morphological patterns are homologous in the two groups, but this claim remains disputed. Many developmental hypotheses have been proposed, including assertions that the chignon represents a developmental response to a long and narrow cranial vault, a narrow or flexed basicranium, or a prognathic face. These claims, however, remain to be metrically quantified in a large subadult sample, and little is known about the feature’s developmental, functional, or evolutionary significance. This study assesses patterns of chignon development and covariation in a comparative sample of extant human growth study cephalograms. Cephalograms from a total of 549 European-derived North American subjects (286 male, 263 female) were scored on a 5-stage ranking system of chignon prominence. Occipital squama shape was found to exist along a continuum, with 34 subjects (6.19%) possessing defined chignons, and 54 subjects (9.84%) possessing very little occipital squama convexity. From this larger sample, those subjects represented by a complete radiographic series were selected for metric analysis. Measurements were collected from lateral and posteroanterior (PA) cephalograms of 26 subjects (16 male, 10 female), each represented at 3 longitudinal age groups. Age group 1 (range: 3.0-6.0 years) includes subjects during a period of rapid brain growth. Age group 2 (range: 8.0-9.5 years) includes subjects during a stage in which brain growth has largely ceased, but cranial and facial development continues. Age group 3 (range: 15.9-20.4 years) includes subjects at their adult stage. A total of 16 landmarks and 153 sliding semi-landmarks were digitized at each age point, and geometric morphometric analyses, including relative warps analysis and two-block partial least squares analysis, were conducted to study covariation patterns between midsagittal occipital bone shape and other aspects of craniofacial morphology. A convex occipital squama was found to covary significantly with a low, elongated neurocranial vault, and this pattern was found to exist from the youngest age group. Other tested patterns of covariation, including cranial and basicranial breadth, basicranial angle, midcoronal cranial vault shape, and facial prognathism, were not found to be significant at any age group. These results suggest that the chignon, at least in this sample, should not be considered an independent feature, but rather the result of developmental interactions relating to neurocranial elongation. While more work must be done to quantify chignon morphology in fossil subadults, this study finds no evidence to disprove the developmental homology of the feature in modern humans and Neandertals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chignon" title="chignon">chignon</a>, <a href="https://publications.waset.org/abstracts/search?q=craniofacial%20covariation" title=" craniofacial covariation"> craniofacial covariation</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20cranial%20development" title=" human cranial development"> human cranial development</a>, <a href="https://publications.waset.org/abstracts/search?q=longitudinal%20growth%20study" title=" longitudinal growth study"> longitudinal growth study</a>, <a href="https://publications.waset.org/abstracts/search?q=occipital%20bun" title=" occipital bun"> occipital bun</a> </p> <a href="https://publications.waset.org/abstracts/82087/occipital-squama-convexity-and-neurocranial-covariation-in-extant-homo-sapiens" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82087.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">201</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> Genodata: The Human Genome Variation Using BigData</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Surabhi%20Maiti">Surabhi Maiti</a>, <a href="https://publications.waset.org/abstracts/search?q=Prajakta%20Tamhankar"> Prajakta Tamhankar</a>, <a href="https://publications.waset.org/abstracts/search?q=Prachi%20Uttam%20Mehta"> Prachi Uttam Mehta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since the accomplishment of the Human Genome Project, there has been an unparalled escalation in the sequencing of genomic data. This project has been the first major vault in the field of medical research, especially in genomics. This project won accolades by using a concept called Bigdata which was earlier, extensively used to gain value for business. Bigdata makes use of data sets which are generally in the form of files of size terabytes, petabytes, or exabytes and these data sets were traditionally used and managed using excel sheets and RDBMS. The voluminous data made the process tedious and time consuming and hence a stronger framework called Hadoop was introduced in the field of genetic sciences to make data processing faster and efficient. This paper focuses on using SPARK which is gaining momentum with the advancement of BigData technologies. Cloud Storage is an effective medium for storage of large data sets which is generated from the genetic research and the resultant sets produced from SPARK analysis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20genome%20project" title="human genome project">human genome project</a>, <a href="https://publications.waset.org/abstracts/search?q=Bigdata" title=" Bigdata"> Bigdata</a>, <a href="https://publications.waset.org/abstracts/search?q=genomic%20data" title=" genomic data"> genomic data</a>, <a href="https://publications.waset.org/abstracts/search?q=SPARK" title=" SPARK"> SPARK</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20storage" title=" cloud storage"> cloud storage</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadoop" title=" Hadoop"> Hadoop</a> </p> <a href="https://publications.waset.org/abstracts/46626/genodata-the-human-genome-variation-using-bigdata" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46626.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> It Is Time to Perform Total Laparoscopic Hysterectomy (TLH) without the Use of Uterine Manipulator: Kamran's TLH</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Gendia">Ahmed Gendia</a>, <a href="https://publications.waset.org/abstracts/search?q=Waseem%20Kamran"> Waseem Kamran </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Objective: Total Laparoscopic hysterectomy (TLH) remains a common approach among laparoscopic surgeons. However, this approach depends on the use of uterine manipulator to facilitate the surgery. Although many studies reported the effectiveness of TLH with uterine manipulator, only few reported TLH without the use of any uterine or vaginal manipulation. the aim of this report is to demonstrate our Technique (kamran's TLH) in performing TLH without the use of any uterine or vaginal manipulation in benign conditions and report our intra- and post-operative outcomes. Methodology : surgical technique will be demonstrated through a short video highlighting the easy and safe to learn surgical steps. Additionally, the data of 86 patients who underwent KTLH for benign condition were retrospectively analyzed. the data included intra- and postoperative finding and complications. Results : A total of 86 hysterectomies were performed utilizing the Kamran's TLH ( KTHL). Mean age was 52.2 (±11) years old and BMI was 28.2(±7). Mean operative time was 64.7(±27.9) minutes and estimated bloods loss was 46.2(±54.6) ml. No intraoperative complications were recorded and there was no conversion to open surgery. Only one patient required readmission and surgery for vaginal vault dehiscence. Conclusion & Significance: Uterine manipulator is a key component in performing laparoscopic hysterectomy. However, our approach demonstrated that TLH can be safely performed without the use of any uterine or vaginal manipulation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=laparoscopic%20hystrectomy" title="laparoscopic hystrectomy">laparoscopic hystrectomy</a>, <a href="https://publications.waset.org/abstracts/search?q=TLH" title=" TLH"> TLH</a>, <a href="https://publications.waset.org/abstracts/search?q=uterine%20manipulator" title=" uterine manipulator"> uterine manipulator</a>, <a href="https://publications.waset.org/abstracts/search?q=surgery" title=" surgery "> surgery </a> </p> <a href="https://publications.waset.org/abstracts/128639/it-is-time-to-perform-total-laparoscopic-hysterectomy-tlh-without-the-use-of-uterine-manipulator-kamrans-tlh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128639.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Design of an Ensemble Learning Behavior Anomaly Detection Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdoulaye%20Diop">Abdoulaye Diop</a>, <a href="https://publications.waset.org/abstracts/search?q=Nahid%20Emad"> Nahid Emad</a>, <a href="https://publications.waset.org/abstracts/search?q=Thierry%20Winter"> Thierry Winter</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Hilia"> Mohamed Hilia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection" title=" data protection"> data protection</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control" title=" access control"> access control</a>, <a href="https://publications.waset.org/abstracts/search?q=insider%20threat" title=" insider threat"> insider threat</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20behavior%20analysis" title=" user behavior analysis"> user behavior analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=ensemble%20learning" title=" ensemble learning"> ensemble learning</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20performance%20computing" title=" high performance computing"> high performance computing</a> </p> <a href="https://publications.waset.org/abstracts/109933/design-of-an-ensemble-learning-behavior-anomaly-detection-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/109933.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">128</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomas%20Trainys">Tomas Trainys</a>, <a href="https://publications.waset.org/abstracts/search?q=Algimantas%20Venckauskas"> Algimantas Venckauskas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bio-cryptography" title="bio-cryptography">bio-cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=biometrics" title=" biometrics"> biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptographic%20key%20generation" title=" cryptographic key generation"> cryptographic key generation</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20fusion" title=" data fusion"> data fusion</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=SVM" title=" SVM"> SVM</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20recognition" title=" pattern recognition"> pattern recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=finger%20vein%20method." title=" finger vein method."> finger vein method.</a> </p> <a href="https://publications.waset.org/abstracts/97366/preprocessing-and-fusion-of-multiple-representation-of-finger-vein-patterns-using-conventional-and-machine-learning-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97366.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> A Team-Based Learning Game Guided by a Social Robot</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gila%20Kurtz">Gila Kurtz</a>, <a href="https://publications.waset.org/abstracts/search?q=Dan%20Kohen%20Vacs"> Dan Kohen Vacs</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social robots (SR) is an emerging field striving to deploy computers capable of resembling human shapes and mimicking human movements, gestures, and behaviors. The evolving capability of SR to interact with human offers groundbreaking ways for learning and training opportunities. Studies show that SR can offer instructional experiences for fostering creativity, entertainment, enjoyment, and curiosity. These added values are essential for empowering instructional opportunities as gamified learning experiences. We present our project focused on deploying an activity to be experienced in an escape room aimed at team-based learning scaffolded by an SR, NAO. An escape room is a well-known approach for gamified activities focused on a simulated scenario experienced by team-based participants. Usually, the simulation takes place in a physical environment where participants must complete a series of challenges in a limited amount of time. During this experience, players learn something about the assigned topic of the room. In the current learning simulation, students must "save the nation" by locating sensitive information stolen and stored in a vault of four locks. Team members have to look for hints and solve riddles mediated by NAO. Each solution provides a unique code for opening one of the four locks. NAO is also used to provide ongoing feedback on the team's performance. We captured the proceeding of our activity and used it to conduct an evaluation study among ten experts in related areas. The experts were interviewed on their overall assessment of the learning activity and their perception of the added value related to the robot. The results were very encouraging on the feasibility that NAO can serve as a motivational tutor in adults' collaborative game-based learning. We believe that this study marks the first step toward a template for developing innovative team-based training using escape rooms supported by a humanoid robot. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20robot" title="social robot">social robot</a>, <a href="https://publications.waset.org/abstracts/search?q=NAO" title=" NAO"> NAO</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a>, <a href="https://publications.waset.org/abstracts/search?q=team%20based%20activity" title=" team based activity"> team based activity</a>, <a href="https://publications.waset.org/abstracts/search?q=escape%20room" title=" escape room"> escape room</a> </p> <a href="https://publications.waset.org/abstracts/155044/a-team-based-learning-game-guided-by-a-social-robot" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155044.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">68</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> Ngala Kadidjiny: An Elder Approved Commitment to Involving Aboriginal Community throughout Research on Homelessness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jackie%20Oakley">Jackie Oakley</a>, <a href="https://publications.waset.org/abstracts/search?q=Alice%20V.%20Brown"> Alice V. Brown</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Those experiencing homelessness are regularly excluded from the development of policies and services that impact their lives. This is particularly true for Aboriginal and Torres Strait Islander people experiencing homelessness in Australia, who tend to have differing needs, cultural obligations, and views of what equates to a ‘home’ and ‘homelessness’ than non-Aboriginal Australians. Aboriginal people are the traditional owners of Australia yet have had to survive within colonial housing customs, housing and homelessness policies, and markets that often conflict with their culture. Recognising this, in 2022, we commenced community-led research into the needs of Aboriginal people experiencing homelessness in Perth. Historically, research has often been done on Aboriginal people rather than with them. As such, a Participatory Action Research methodology was chosen, which recognises that those being researched are the experts of their circumstances rather than the research team, and facilitates their driving of the research, its questions, and how their community can directly benefit. A Community Ownership Group (COG) was formed to guide this process and negotiate the best ways that the Aboriginal community can be fairly and adequately involved. The COG approved a process developed by an Aboriginal Elder called Ngala Kadidjiny (Knowledge Vault), which outlines who and when various groups should be consulted throughout the research to ensure adequate involvement of the Aboriginal community at all stages. The process includes many markers of research integrity, including ensuring a Community Ownership Group is formed with diversity and recruiting its members through votes taking place within Elders groups across the metropolitan area. The process also demands that the community have the chance to review research findings before any findings are published. Additionally, the process asks that draft reports and findings are delivered to the broader community and Community Ownership Groups before being finalised, published, and shared officially with stakeholders and the government. This paper details how Ngala Kadidjiny’s process impacted the research, how it was explained and agreed upon by the Aboriginal community, the benefits and challenges of such a process, and its implications for other community-led research for and with Aboriginal people experiencing homelessness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aboriginal%20and%20Torres%20Strait%20Islander%20peoples" title="Aboriginal and Torres Strait Islander peoples">Aboriginal and Torres Strait Islander peoples</a>, <a href="https://publications.waset.org/abstracts/search?q=Aboriginal%20elders" title=" Aboriginal elders"> Aboriginal elders</a>, <a href="https://publications.waset.org/abstracts/search?q=homelessness" title=" homelessness"> homelessness</a>, <a href="https://publications.waset.org/abstracts/search?q=community-led%20research" title=" community-led research"> community-led research</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20consultation" title=" community consultation"> community consultation</a> </p> <a href="https://publications.waset.org/abstracts/156584/ngala-kadidjiny-an-elder-approved-commitment-to-involving-aboriginal-community-throughout-research-on-homelessness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156584.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">90</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2</span> The Evolution of Man through Cranial and Dental Remains: A Literature Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rishana%20Bilimoria">Rishana Bilimoria</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Darwin’s insightful anthropological theory on the evolution drove mankind’s understanding of our existence in the natural world. Scientists consider analysis of dental and craniofacial remains to be pivotal in uncovering facts about our evolutionary journey. The resilient mineral content of enamel and dentine allow cranial and dental remains to be preserved for millions of years, making it an excellent resource not only in anthropology but other fields of research including forensic dentistry. This literature review aims to chronologically approach each ancestral species, reviewing Australopithecus, Paranthropus, Homo Habilis, Homo Rudolfensis, Homo Erectus, Homo Neanderthalis, and finally Homo Sapiens. Studies included in the review assess the features of cranio-dental remains that are of evolutionary importance, such as microstructure, microwear, morphology, and jaw biomechanics. The article discusses the plethora of analysis techniques employed to study dental remains including carbon dating, dental topography, confocal imaging, DPI scanning and light microscopy, in addition to microwear study and analysis of features such as coronal and root morphology, mandibular corpus shape, craniofacial anatomy and microstructure. Furthermore, results from these studies provide insight into the diet, lifestyle and consequently, ecological surroundings of each species. We can correlate dental fossil evidence with wider theories on pivotal global events, to help us contextualize each species in space and time. Examples include dietary adaptation during the period of global cooling converting the landscape of Africa from forest to grassland. Global migration ‘out of Africa’ can be demonstrated by enamel thickness variation, cranial vault variation over time demonstrates accommodation to larger brain sizes, and dental wear patterns can place the commencement of lithic technology in history. Conclusions from this literature review show that dental evidence plays a major role in painting a phenotypic and all rounded picture of species of the Homo genus, in particular, analysis of coronal morphology through carbon dating and dental wear analysis. With regards to analysis technique, whilst studies require larger sample sizes, this could be unrealistic since there are limitations in ability to retrieve fossil data. We cannot deny the reliability of carbon dating; however, there is certainly scope for the use of more recent techniques, and further evidence of their success is required. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cranio-facial" title="cranio-facial">cranio-facial</a>, <a href="https://publications.waset.org/abstracts/search?q=dental%20remains" title=" dental remains"> dental remains</a>, <a href="https://publications.waset.org/abstracts/search?q=evolution" title=" evolution"> evolution</a>, <a href="https://publications.waset.org/abstracts/search?q=hominids" title=" hominids"> hominids</a> </p> <a href="https://publications.waset.org/abstracts/83300/the-evolution-of-man-through-cranial-and-dental-remains-a-literature-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83300.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">164</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1</span> Integrated Management System of Plant Genetic Resources: Collection, Conservation, Regeneration and Characterization of Cucurbitaceae and Solanaceae of DOA Genebank, Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kunyaporn%20Pipithsangchan">Kunyaporn Pipithsangchan</a>, <a href="https://publications.waset.org/abstracts/search?q=Alongkorn%20Korntong"> Alongkorn Korntong</a>, <a href="https://publications.waset.org/abstracts/search?q=Assanee%20Songserm"> Assanee Songserm</a>, <a href="https://publications.waset.org/abstracts/search?q=Phatchara%20Piriyavinit"> Phatchara Piriyavinit</a>, <a href="https://publications.waset.org/abstracts/search?q=Saowanee%20Dechakampoo"> Saowanee Dechakampoo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Kingdom of Thailand is one of the South East Asian countries. From its area of 514,000 square kilometers (51 million ha), at least 18,000 plant species (8% of the world total) have been estimated to be found in the country. As a result, the conservation of plant genetic diversity, particularly food crops, is becoming important and is an assurance for the national food security. Department of Agriculture Genebank or DOA Genebank, Thailand is responsible for the conservation of plant germplasm by participating and accomplishing several collaborative projects both at national and international levels. Integrated Management System of Plant Genetic Resources or IMPGR is one of the most outstandingly successful cooperation. It is a multilateral project under the Asian Food and Agriculture Cooperation Initiative (AFACI) supported by the Rural Development Administration (RDA) of South Korea. The member countries under the project consist of 11 nations namely Bangladesh, Cambodia, Indonesia, Laos PDR, Mongolia, Nepal, Philippines, Sri Lanka, Thailand, Vietnam and South Korea. The project enabled the members to jointly address the global issues in plant genetic resource (PGR) conservation and strengthen their network in this aspect. The 1st phase of IMPGR project, entitled 'Collection, Conservation, Regeneration and Characterization of Cucurbitaceae and Solanaceae 2012-2014', comprises three main objectives that are: 1) To improve management in storage facilities, collection, and regeneration, 2) To improve linkage between Genebank and material sources (for regeneration), and 3) To improve linkage between Genebank and other field crop or/and horticultural research centers. The project was done for three years from 2012 to 2014. The activities of the project can be described as following details: In the 1st year, there were 9 target provinces for completing plant genetic resource survey and collection. 108 accessions of PGR were collected. In the 2nd year, PGR were continuously surveyed and collected from 9 provinces. The total number of collection was 140 accessions. In addition, the process of regeneration of 237 accessions collected from 1st and 2nd year was started at several sites namely Biotechnology Research and Development Office, Sukothai Horticultural Research Center, Tak Research, and Development Center and Nakhon Ratchasima Research and Development Center. In the 3rd year, besides survey and collection of 115 accessions from 9 target provinces, PGR characterization and evaluation were done for 206 accessions. Moreover, safety duplication of 253 PGR at the World Seed Vault, RDA, was also done according to Standard Agreement on Germplasm Safety Duplication between Department of Agriculture, Ministry of Agriculture and Cooperatives, the Kingdom of Thailand and the National Agrobiodiversity Center, Rural Development Administration of the Republic of Korea. The success of the 1st phase project led to the second phase which entitled 'Collection and Characterization for Effective Conservation of Local Capsicum spp., Solanum spp. and Lycopersicon spp. in Thailand 2015-2017'. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=characterization" title="characterization">characterization</a>, <a href="https://publications.waset.org/abstracts/search?q=conservation" title=" conservation"> conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=DOA%20genebank" title=" DOA genebank"> DOA genebank</a>, <a href="https://publications.waset.org/abstracts/search?q=plant%20genetic%20resources" title=" plant genetic resources"> plant genetic resources</a> </p> <a href="https://publications.waset.org/abstracts/90992/integrated-management-system-of-plant-genetic-resources-collection-conservation-regeneration-and-characterization-of-cucurbitaceae-and-solanaceae-of-doa-genebank-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90992.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">175</span> </span> </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>